Welcome to the CSER MOOC “CyberSecurity & Awareness” Community! This Community is for participants enrolled in the CSER “CyberSecurity &am..
Hi, I’m Dean.
Primary school teacher and Digital Tech Coordinator.
What are other ways humans can leave traces of information with the use of technologies? Share an example or examples with the community
Whenever we navigate through websites, we might be leaving traces on the internet, which is also called as ‘digital footprint’. Some of th..
A lesson plan for grade 2 on the topic of cyberbullying, the resource provides PowerPoint slides to work through in class, the lesson cove..
Two classroom activities for teaching students about password security
This video teaches elementary students about the differen..
- Applying the same standards online as we do in public. (E.g. values around courtesy, kindness, openness, and treating others with the same respect we wish to receive, no hate speech and bigotry, copyright violations as other forms of theft).
- Help prevent and fight against cyberbullying, as silence empowers bullies.
- Always respect copyright laws and policies to protect original works of authorship.
- Keeping online communications professional, and be clear about differences between business, classroom, and personal emails and text messages.
- Always give credit to the original source. (E.g. citing references in term papers, avoid plagiarism).
- Take care of technology equipment and watch what you download, click, and share.
- Learn how to evaluate websites and assess whether they can trust the content.
- Respect the privacy of others, just as you expect the same from others.
- Do not use computers to harm other users. Words have consequences and what we say online can have consequences in real life.
Teacher Resources Behaving Ethically Online: Ethics and Empathy
Classroom Resource 1:
Digital Passport: 10-minute games
Digital Passport is our award-winning suite of games for students in grades 3-..
Question: Share your thoughts on what you imagine to be the future of cyber attacks. Consider the types of information we store and share ..
1.Share with us your top 5-10 code of ethics statements for using technology in the classroom or your professional workplace.